Common Threats to ICTs and computers
Computer threats refer to any potential danger or malicious activity that can compromise the security or functionality of computer systems and data
Examples of Common Treats to computers and ICTs
1.Malicious software (Malware) designed to harm or attack a computer system. Types include viruses, worms, trojans, ransomware, spyware and Adware.
- Virus – Malicious code that attaches itself to clean files and spreads throughout a computer system, often damaging files and software.
- Worm – Standalone malware that replicates itself to spread to other computers, often exploiting network vulnerabilities.
- Trojan Horse – Malicious software disguised as legitimate software. Trojans do not self-replicate but can create backdoors for other malware.
- Ransomware – Encrypts the victim’s data and demands a ransom (money) for the decryption key.
- Spyware- This secretly monitors and collects user information without their knowledge.
- Adware – Automatically delivers advertisements, often bundled with free software and can redirect browsers to advertising sites Eg Vpns which give free internet.
2. Phishing is a common cyberattack where attackers disguise themselves as trustworthy entities to trick individuals into providing sensitive information like Bank Details, Passwords, and so on
Example of Phishing
- You receive an email that appears to be from your bank, stating there is an issue with your account and asking you to click a link to verify your details.
- You receive a text message claiming to be from your mobile carrier eg MTN or Airtel, stating there is an issue with your account and providing a link to resolve it. The link leads to a fake website that captures your personal information.
3. Hacking: It refers to the unauthorized access to or manipulation of computer systems, networks, or data. Hackers when using various techniques and tools can get access to sensitive data (data Bleach), including personal information, financial records, and intellectual property, leading to identity theft and financial loss
4. Loss of electricity is a significant threat to ICTs and computers as sudden power loss can result in unsaved data being lost ,Hardware Damage such hard drives, motherboards.
5. Software failure: This occurs when a software application or app does not perform its intended function or behaves incorrectly, leading to disruptions or errors eg When a software application stops working unexpectedly, causing loss of unsaved work and interruptions in tasks.
6. Natural disasters like floods, earthquakes, or fires can physically damage ICT infrastructure, including servers, data centers, and communication lines.
In conclusion protecting information and communication technologies (ICTs) and computers involves understanding the threats they face and implementing preventive measures like Regular Backups, Using strong Passwords and Multi-Factor Authentication, Installing Antivirus and Malware Protection, Secure Wi-Fi Connections, etc.
Responses